From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code, , , и . IEEE Transactions on Software Engineering, 32 (3): 176--192 (марта 2006)The evolution of storage service providers: techniques and challenges to outsourcing storage., , и . StorageSS, стр. 1-8. ACM, (2005)Security Challenges of Reconfigurable Devices in the Power Grid., , и . Critical Infrastructure Protection, том 253 из IFIP, стр. 147-160. Springer, (2007)CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code., , , и . OSDI, стр. 289-302. USENIX Association, (2004)Secure Configuration for Software Defined Radio. University of Illinois Urbana-Champaign, USA, (2008)Toward a threat model for storage systems., , , и . StorageSS, стр. 94-102. ACM, (2005)Why Johnny Can Hack: The Mismatch between Vulnerabilities and Security Protection Standards., и . ISSSE, (2006)Threat modeling as a basis for security requirements, , и . Symposium on requirements engineering for information security (SREIS), 2005, стр. 1--8. (2005)Relescope: an experiment in accelerating relationships., , и . CHI Extended Abstracts, стр. 1363-1366. ACM, (2005)